AUTHOR ARCHIVES

Results 51-60 of 73

Yes, Cyberattacks Are Perfectly Legal Under the Laws of War

March 21, 2013 FROM NEXTGOV arrow What’s the fastest way to annoy someone who works in national security? Just say "cyberwarfare" on repeat and watch them combust. The term is meaningless in the worst way—it puts the imagination into paranoid overdrive and is not limited by any legal definitions. All the rules we’ve got on armed...

Memorable Moments From a Departing Telecom Regulator

March 21, 2013 FROM NEXTGOV arrow One of the country’s top federal regulatory officials is resigning. Robert McDowell, one of two Republican members of the Federal Communications Commission, said Wednesday he plans to step down. He doesn’t have anything lined up—except for a vacation—which is about the most boring plan, ever. But after his seven-year stint...

The Future of Data Security

March 19, 2013 FROM NEXTGOV arrow Imagine a library. Every night, the library locks its doors. But one night, a burglar manages to get in. All the books and manuscripts are gone, right? Not in this library. You see, in this library, most of the books themselves are locked down, and the ones the robber does...

What's Missing From the GOP's Technology Strategy?

March 19, 2013 FROM NEXTGOV arrow The Republican National Committee’s sweeping new strategy document admits what observers have been saying since the GOP lost the White House for the second time running last year: The party faces an identity crisis. How the report suggests fixing that, as my colleague Matt Cooper notes, is mostly a matter...

Is One Act of Cyber Vandalism Worth 25 Years in Jail?

March 15, 2013 FROM NEXTGOV arrow Matthew Keys is in some hot water. The deputy social media editor for Thompson Reuters was federally indicted Thursday on three counts of conspiracy to hack the Tribune Company, his former employer. If he's convicted, Keys faces up to 30 years in prison and a $750,000 fine. According to the...

Who's Going to Blink First on Cyber — Obama, or the House?

March 14, 2013 FROM NEXTGOV arrow The Obama administration will now have to weigh in sooner rather than later on a highly contentious cybersecurity bill moving through the House. With two days to go, a public plea for Obama to stop the Cyber Intelligence Sharing and Protection Act, or CISPA, has crossed the 100,000-signature threshold required...

How the Humble Telephone Is About to Bring Internet to the Masses (Again)

March 12, 2013 FROM NEXTGOV arrow Ten years ago, if you went to pick up a phone call, your voice would have been carried across the same copper-wire technology that powered America’s very first telephone system. Today? With recent advances, at least some of your call would be routed through pipes that also carry Internet traffic....

How Many Cyberattacks Hit the United States Last Year?

March 8, 2013 FROM NEXTGOV arrow Thanks to the warnings of senior lawmakers and Obama admiistration officials, Americans are growing more aware of online vulnerabilities that could lead to a “cyber Pearl Harbor” attack. By definition, such a catastrophe would be extraordinarily rare, its chances perhaps no more than one in a ... what, exactly? It’s...

Democrats' Dilemma on High-Skilled Immigration Reform

March 7, 2013 FROM NEXTGOV arrow For years, the phrase "immigration reform" has meant two things for Republicans: a contest to see who could be toughest on the 11 million people living in the United States who aren't supposed to be, and a flood of proposals to fortify the nation's borders. For Democrats, the term has...

That Was Quick: Now There's Legislation on Cellphone Unlocking

March 6, 2013 FROM NEXTGOV arrow From the beginning, White House petitioners looking to keep phone-unlocking legal have insisted that they want Congress’ help. Barely a day after their first victory, in which the Obama administration expressed support for consumers who want to switch wireless carriers while being able to take their phones with them, the...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by Brocade

    Best of 2016 Federal Forum eBook

    Earlier this summer, Federal and tech industry leaders convened to talk security, machine learning, network modernization, DevOps, and much more at the 2016 Federal Forum. This eBook includes a useful summary highlighting the best content shared at the 2016 Federal Forum to help agencies modernize their network infrastructure.

    Download
  • Sponsored by CDW-G

    GBC Flash Poll Series: Merger & Acquisitions

    Download this GBC Flash Poll to learn more about federal perspectives on the impact of industry consolidation.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by Aquilent

    A DevOps Roadmap for the Federal Government

    This GBC Report discusses how DevOps is steadily gaining traction among some of government's leading IT developers and agencies.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download
  • Sponsored by CDW-G

    Joint Enterprise Licensing Agreements

    Read this eBook to learn how defense agencies can achieve savings and efficiencies with an Enterprise Software Agreement.

    Download
  • Sponsored by Cloudera

    Government Forum Content Library

    Get all the essential resources needed for effective technology strategies in the federal landscape.

    Download

When you download a report, your information may be shared with the underwriters of that document.